sb-au logo
Story image

New online tool helps organisations evaluate security maturity

17 Sep 2018

Security solutions provider Secureworks has released its Security Maturity Model, a pragmatic methodology that organisations of all sizes can use to evaluate their level of cybersecurity maturity relative to inherent risk.  

Secureworks is releasing the model in response to its research which shows that more than one-third of US organisations (37%) face security risks that exceed their overall security maturity.

Within that group, 10% face a significant deficiency when it comes to protecting themselves from the threats in their environment.

To increase global awareness of the gaps between cybersecurity maturity and risk, Secureworks is offering a complimentary evaluation that organisations can take to benchmark their maturity using the Secureworks methodology. 

Cybersecurity leaders who complete an online tool with the support of a Secureworks security expert will receive a report that scores the organisation’s capabilities and behaviours across five essential cybersecurity domains.

The report also assigns a current security maturity tier and compares the organisation’s results to peer benchmarks.

Intuitive charts and graphs throughout the report can be used to identify a desired future state of maturity, prioritise next steps in the journey and support more confident discussions about cybersecurity risk management with the board.

Secureworks consulting practice leader Hadi Hosn says, “Business executives tell us they’re looking for ways to determine whether their cybersecurity capabilities and investment are in line with their business risk profile.”

“Our recent study suggests that misalignment between security activities and actual risk is common enough to warrant a more pragmatic model that can help organisations both identify those gaps and adjust their security maturity goals accordingly.”

Secureworks’ Security Maturity Model is a holistic, risk-driven approach that incorporates elements of frameworks like National Institute of Standards and Technology (NIST) and ISO 27001/02 with insight from Secureworks’ global threat intelligence, analysis of more than 1,000 incident response engagements annually and observed best practices across 4,300 clients.

Organisations who evaluate their maturity against this methodology are scored in the cybersecurity domains of security organisation and governance, security operations, cloud security, incident management and threat intelligence.

“Most frameworks come up short in helping you define the right journey to cybersecurity maturity because they don’t account for inherent risk to begin with,” says Hosn.

“Instead of relying on checklists, the Secureworks Security Maturity Model blends industry best practice frameworks with our knowledge and experience to help organisations invest resources more wisely.”

Key Findings: Secureworks Security Leadership Study

In Secureworks’ 2018 Security Leadership study, guarded companies, the least mature, were lacking the same processes that are commonly shared by resilient organisations, the most secure 7% of the respondents.

The most divergent practices between resilient and guarded organisations include:

  • Aligning and prioritising vulnerability assessments based on business goals (56% for resilient organisations vs. 2% for guarded, the least mature group)  
  • Conducting real-time automated security analysis of business partners (36% vs. 2%)  
  • Employing customised endpoint protection based on user profiles (84% vs. 3%)  
  • Including both technical and business teams in Incidence Response tabletop sessions (92% vs. 45%)  
  • Working with IR partners under retainer agreements (56% vs. 18%)  
  • Integrating threat indicators, with enhancements, into security and workflow controls (80% vs. 6%)
Story image
Remote staff overestimating knowledge of cybersecurity basics
‘Unconscious incompetence’ is one of the most difficult issues to identify and solve with security awareness training.More
Story image
Fortinet SOARs to new heights of protection on the wings of AI & automation
Jon McGettigan, Fortinet A/NZ Regional Director, talks about SOAR (security orchestration, automation and response) and explains that effective SOAR starts with your security policy.More
Story image
75% of IT execs 'worried' about being targeted in cyber-attack
A new report from ConnectWise has shed light on the widespread concern about cyber-attacks, with 91% of SMB executives considering a move to an MSP if it provided the 'right' solution.More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More
Link image
Gartner report: Why SD-WAN is becoming the de-facto option
Network service providers are increasingly challenged by established and new competition in the overlay SD-WAN management as well as in the underlay WAN transport, the report says.More
Story image
Fortinet’s ‘zero trust’ approach redefining security
Cornelius Mare, Fortinet A/NZ Director, Security Solutions, explains why taking a ‘zero trust network access’ approach to cybersecurity requires fully-integrated and comprehensive security services and policies.More